Versio.io

CVE-2014-5338

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 05-05-2014 02:00
Last modified: - 05-05-2014 02:00
Total changes: - 10

Description

CVE-2014-5338 CVE-2014-5339 CVE-2014-5340 check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4

Common Vulnerability Scoring System (CVSS)

AV:N/AC:L/Au:N/C:P/I:P/A:P
Low
Attack complexity
Network
Attack vector
Low
Availability
Low
Confidentiality
Low
Integrity
-
Privileges required
-
Scope
-
User interaction
7.5
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=glusterfs-0 AND versionEndExcluding=3.7.1-11.el5
vendor=Red Hat Enterprise Linux AND product=storage AND version=2
AND
product=glusterfs-0 AND versionEndExcluding=3.7.1-11.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3
AND
product=augeas-0 AND versionEndExcluding=1.0.0-10.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=check-mk-0 AND versionEndExcluding=1.2.6p1-3.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=clufter-0 AND versionEndExcluding=0.11.2-1.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=cluster-0 AND versionEndExcluding=3.0.12.1-73.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=clustermon-0 AND versionEndExcluding=0.16.2-31.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=corosync-0 AND versionEndExcluding=1.4.7-2.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=ctdb2.5-0 AND versionEndExcluding=2.5.5-7.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=fence-virt-0 AND versionEndExcluding=0.2.3-19.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=glusterfs-0 AND versionEndExcluding=3.7.1-11.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gluster-nagios-addons-0 AND versionEndExcluding=0.2.4-4.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gluster-nagios-common-0 AND versionEndExcluding=0.2.0-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gstatus-0 AND versionEndExcluding=0.64-3.1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=libqb-0 AND versionEndExcluding=0.17.1-1.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=libtalloc-0 AND versionEndExcluding=2.1.1-4.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=libvirt-0 AND versionEndExcluding=0.10.2-54.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=nagios-plugins-0 AND versionEndExcluding=1.4.16-12.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=nagios-server-addons-0 AND versionEndExcluding=0.2.1-4.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=nfs-ganesha-0 AND versionEndExcluding=2.2.0-5.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=nrpe-0 AND versionEndExcluding=2.15-4.1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=openais-0 AND versionEndExcluding=1.1.1-7.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=openstack-swift-0 AND versionEndExcluding=1.13.1-4.el6ost
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=pacemaker-0 AND versionEndExcluding=1.1.12-8.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=pcs-0 AND versionEndExcluding=0.9.139-9.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=pnp4nagios-0 AND versionEndExcluding=0.6.22-2.1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=pynag-0 AND versionEndExcluding=0.9.1-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=python-blivet-1 AND versionEndExcluding=1.0.0.2-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=python-cpopen-0 AND versionEndExcluding=1.3-4.el6_5
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=python-eventlet-0 AND versionEndExcluding=0.14.0-1.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=python-greenlet-0 AND versionEndExcluding=0.4.2-1.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=python-keystoneclient-1 AND versionEndExcluding=0.9.0-5.el6ost
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=python-prettytable-0 AND versionEndExcluding=0.7.2-1.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=python-pyudev-0 AND versionEndExcluding=0.15-2.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=redhat-storage-logos-0 AND versionEndExcluding=60.0.20-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=redhat-storage-server-0 AND versionEndExcluding=3.1.0.3-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=resource-agents-0 AND versionEndExcluding=3.9.5-24.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=ricci-0 AND versionEndExcluding=0.16.2-81.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=userspace-rcu-0 AND versionEndExcluding=0.7.9-2.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=vdsm-0 AND versionEndExcluding=4.16.20-1.2.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
 

Reference

 


Keywords

REDHAT

 

CVE-2014-5338

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.